Bring Your Exam Home: A Framework for an Efficient E-Exam Based on IoT Architecture

ABSTRACT: The revolution of Internet Technology has achieved an unprecedented pace with the creation of a smart environment where individuals can control their environment remotely using sensors. These smart environments are now gradually replacing existing internet infrastructure. In order not to be outpaced, we report a proposal on the concept of the Internet of Things

Students Data Encryption System Using Advanced Encryption Standard (AES) Algorithm

ABSTRACT: Akanu Ibiam Federal Polytechnic in recent years has adopted information and communication Technology (ICT) as a means of acquiring and updating student’s registration and examination record on real time through internet. Due to unreliability of these sensitive students’ documents to attacks of various types, there is a need to develop and apply a security

Single and Cooperative Attack Detection in MANETS Using Enhanced Bait Approach

ABSTRACT: Mobile ad-hoc networks (MANETs) have received drastically increasing interest, due to their potential applicability to myriad applications. The deployment of such network however, poses several challenging issues, due to their dynamic nature and other characteristics such as lack of fixed communication infrastructure, centralized administration, nodes mobility and dynamic topological changes which makes it susceptible

Data Breach: Threat, Detection and Prevention

ABSTRACT: This paper examines the trends in data breach; the threat; detection and provides recommendation on various ways of defending against attack.  Data breach has become one the most dominant cybersecurity incidents in the world and the trend appears to be growing, attackers are becoming more sophisticated and there seems to be no solution at

Cybersecurity Atlas, Nigeria

ABSTRACT As cyber-attacks continue to evolve, posing real threats to businesses, individuals and national security, there is an urgent need to respond with concerted effort to counter the threats. Nigeria is the 8th country in the world with most internet users and the threat of cyber-attacks can only get worse. An effective response would require

Use Case Dimensionality of Processor Performance Evaluation and Analysis Tool

ABSTRACT: Advancements in processor technology occur in geometric pattern which makes performance analysis challenging for processor manufacturers. The bottleneck in analyzing processor performance arises since processors must be implemented on hardware cores before carrying out critical evaluation and then the analysis. Dimensionality of processor performance analysis (PPA) system leverages the use of a developed software

Implementation of Wireless Computer Network for Scientific Equipment Development Institute (SEDI)

ABSTRACT: Wireless network has simplify networking by enabling multiple users to simultaneously connect and share resources without additional wiring, and provides person-to-person communication, which is certainly a desirable feature for any organisation that really wants to keep in tune with Information Technology. Wired networking has some limitations such as running additional wires for any new